Security of the Strong Room/Vault Sample Clauses

Security of the Strong Room/Vault. 3.1.1 Banks shall take necessary steps to ensure that the area in which the locker facility is housed is properly secured to prevent criminal break-ins. The risks of accessibility of an allotted locker from any side without involvement of the locker-hirer concerned may be assessed and kept on record. Banks shall have a single defined point of entry and exit to the locker room/vault. The place where the lockers are housed must be secured enough to protect against hazard of rain / flood water entering and damaging the lockers in contingent situations. The fire hazard risks of the area should also be assessed and minimized. The banks, as per their policy, shall conduct necessary engineering / safety verification regularly to identify the risks and carry out necessary rectification.
AutoNDA by SimpleDocs

Related to Security of the Strong Room/Vault

  • Procurement of the Site 10.3.1 Pursuant to the notice specified in Clause 4.1.2, the Authority Representative and the Concessionaire shall, on a mutually agreed date and time, inspect the Site and prepare a memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site. Such memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been granted to the Concessionaire. Signing of the memorandum, in two counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall, subject to the provisions of Clause 10.2.2, be deemed to constitute a valid licence and Right of Way to the Concessionaire for free and unrestricted use and development of the vacant and unencumbered Site during the Concession Period under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. For the avoidance of doubt, it is agreed that valid licence and Right of Way with respect to the parts of the Site as set forth in the Appendix shall be deemed to have been granted to the Concessionaire upon vacant access thereto being provided by the Authority to the Concessionaire.

  • Security of Premises 6A.5 The Customer shall be responsible for maintaining the security of the Premises in accordance with its standard security requirements. The Supplier shall comply with all reasonable security requirements of the Customer while on the Premises and shall ensure that the Supplier’s Staff comply with such requirements.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule 2 DELIVERABLES AND COMPLETION DATE The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Security of Data a. Each of the parties shall:

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • Priority of agreements and errors discrepancies

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Continuity of Coverage When a new employee to the district was previously employed by a SEBB employer and was eligible for SEBB coverage, that employee will have uninterrupted benefit coverage if they are anticipated to work 630 hours or more in the school year. If an employee was not anticipated to work 630 hours in a school year but meets that eligibility criteria during the school year, the employee will become eligible for SEBB benefits and will begin coverage in the month following this establishment of eligibility.

  • Description of the service 9.1.1 Internet banking service implies an ability for the client to manage and receive remotely the following services from the bank by means of using the special Internet-site of the bank xxxxx://xxx.xxxxxxxxxxxxxxx.xx:

Time is Money Join Law Insider Premium to draft better contracts faster.